frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Stop building automations. Start running your business

https://www.fluxtopus.com/automate-your-business
1•valboa•37s ago•1 comments

You can't QA your way to the frontier

https://www.scorecard.io/blog/you-cant-qa-your-way-to-the-frontier
1•gk1•1m ago•0 comments

Show HN: PalettePoint – AI color palette generator from text or images

https://palettepoint.com
1•latentio•2m ago•0 comments

Robust and Interactable World Models in Computer Vision [video]

https://www.youtube.com/watch?v=9B4kkaGOozA
1•Anon84•6m ago•0 comments

Nestlé couldn't crack Japan's coffee market.Then they hired a child psychologist

https://twitter.com/BigBrainMkting/status/2019792335509541220
1•rmason•7m ago•0 comments

Notes for February 2-7

https://taoofmac.com/space/notes/2026/02/07/2000
2•rcarmo•9m ago•0 comments

Study confirms experience beats youthful enthusiasm

https://www.theregister.com/2026/02/07/boomers_vs_zoomers_workplace/
2•Willingham•16m ago•0 comments

The Big Hunger by Walter J Miller, Jr. (1952)

https://lauriepenny.substack.com/p/the-big-hunger
1•shervinafshar•17m ago•0 comments

The Genus Amanita

https://www.mushroomexpert.com/amanita.html
1•rolph•22m ago•0 comments

We have broken SHA-1 in practice

https://shattered.io/
4•mooreds•22m ago•2 comments

Ask HN: Was my first management job bad, or is this what management is like?

1•Buttons840•23m ago•0 comments

Ask HN: How to Reduce Time Spent Crimping?

2•pinkmuffinere•25m ago•0 comments

KV Cache Transform Coding for Compact Storage in LLM Inference

https://arxiv.org/abs/2511.01815
1•walterbell•29m ago•0 comments

A quantitative, multimodal wearable bioelectronic device for stress assessment

https://www.nature.com/articles/s41467-025-67747-9
1•PaulHoule•31m ago•0 comments

Why Big Tech Is Throwing Cash into India in Quest for AI Supremacy

https://www.wsj.com/world/india/why-big-tech-is-throwing-cash-into-india-in-quest-for-ai-supremac...
1•saikatsg•31m ago•0 comments

How to shoot yourself in the foot – 2026 edition

https://github.com/aweussom/HowToShootYourselfInTheFoot
1•aweussom•32m ago•0 comments

Eight More Months of Agents

https://crawshaw.io/blog/eight-more-months-of-agents
4•archb•34m ago•0 comments

From Human Thought to Machine Coordination

https://www.psychologytoday.com/us/blog/the-digital-self/202602/from-human-thought-to-machine-coo...
1•walterbell•34m ago•0 comments

The new X API pricing must be a joke

https://developer.x.com/
1•danver0•35m ago•0 comments

Show HN: RMA Dashboard fast SAST results for monorepos (SARIF and triage)

https://rma-dashboard.bukhari-kibuka7.workers.dev/
1•bumahkib7•35m ago•0 comments

Show HN: Source code graphRAG for Java/Kotlin development based on jQAssistant

https://github.com/2015xli/jqassistant-graph-rag
1•artigent•40m ago•0 comments

Python Only Has One Real Competitor

https://mccue.dev/pages/2-6-26-python-competitor
4•dragandj•42m ago•0 comments

Tmux to Zellij (and Back)

https://www.mauriciopoppe.com/notes/tmux-to-zellij/
1•maurizzzio•42m ago•1 comments

Ask HN: How are you using specialized agents to accelerate your work?

1•otterley•44m ago•0 comments

Passing user_id through 6 services? OTel Baggage fixes this

https://signoz.io/blog/otel-baggage/
1•pranay01•45m ago•0 comments

DavMail Pop/IMAP/SMTP/Caldav/Carddav/LDAP Exchange Gateway

https://davmail.sourceforge.net/
1•todsacerdoti•45m ago•0 comments

Visual data modelling in the browser (open source)

https://github.com/sqlmodel/sqlmodel
1•Sean766•47m ago•0 comments

Show HN: Tharos – CLI to find and autofix security bugs using local LLMs

https://github.com/chinonsochikelue/tharos
1•fluantix•48m ago•0 comments

Oddly Simple GUI Programs

https://simonsafar.com/2024/win32_lights/
1•MaximilianEmel•48m ago•0 comments

The New Playbook for Leaders [pdf]

https://www.ibli.com/IBLI%20OnePagers%20The%20Plays%20Summarized.pdf
1•mooreds•49m ago•1 comments
Open in hackernews

Zero Standing Privilege: Marginal Improvement on the Wrong Paradigm

https://gluufederation.medium.com/zero-standing-privilege-marginal-improvement-on-the-wrong-enterprise-security-paradigm-061fde7b84a2
2•mooreds•4mo ago

Comments

jiggawatts•4mo ago
Except for perhaps at the hyper-scalers where delegated permissions are granted to thousands of support staff, techs, engineers, developers, etc... this kind of fine-grained permission model is a no-go.

It's hard to explain, but it reminds me of the Semantic Web, this totally artificial theoretical construct of how Things Should Be, but... it never worked out like that, and never will. Market forces just don't align with these ivory tower approaches of how things Ought To Be Done.

On the contrary, all too often worse is better, because it scales effortlessly, is faster, and much more importantly: cheaper.

This applies to priviliged identity management (PIM) and its variations.

What I see in most organisations is that the "least trusted" person, the outsourced subcontractor to the contractor, some below-minimum-wage person working out of Chennai is the "Global Admin" (or equivalent) and the CEO, CIO, CTO, and the CISO all have... no special rights. The same as a random secretary.

I see this pattern over and over, organisation after organisation. The exceptions are few and far between, so there must be a reason!

My best guess is that this is because as permissions delegation get finer and finer grained, then the manager delegating the permissions needs better and better knowledge of the technical task to be done in the future to properly and accurately delegate all -- not just some(!) -- of the permissions required to execute that task.

How would you delegate the permissions to fix an "error" (unspecified!) "somewhere" in the tangled network of servers and other equipment?

Remember: No gaps! No missing permissions! This has to be one hundred percent coverage, no edits on the fly, because this troubleshooting could be at 3am on a Sunday after a disaster that could stop the business operating on Monday morning.

No, getting woken up at 3:30am to delegate more permissions is not something most senior managers will accept. Even if they're forced to at gunpoint, what exactly are they going to do? The clock is ticking, the system is down, they don't even know where the problem is! If the +1 permission they just granted is not sufficient, they'll have to grant one more at 4:00am, then 4:30am, then 5:00am and so forth until the business is back up.

This means that with sufficiently fine-grained permissions, eventually the "delegator" has to be 100% involved throughout the entire time complex ad-hoc tasks are performed. This isn't just troubleshooting, it's consultants, it's new deployments, migrations, mergers, splits, role changes, reshuffles, or anything that wasn't 100% perfectly foreseen by the original security delegation architects.

Not to mention that "security architect" is a specialisation with very little overlap with any specific product or business system. The "person in charge" of some database, platform, or product is very unlikely to fully grok delegated ACLs, ZSP, PIM, etc...

This just doesn't scale. Managers overseeing, say, five staff can't be 100% involved in all five staff doing ad-hoc work. Even if they can make this work, what about the next level management, the level from which this manager gets their delegated permissions (which they can further delegate)? Run this up to the level of CIO and with a sufficiently specific access control design you'll have the CIO doing nothing else other than mashing buttons in the some security delegation system such as Active Directory!

It's just soooo much easier to give the lowly tech "Domain Admin" and be done with it.

The alternative with ZSP or whatever is Ivory Tower stuff that only works in "tech organisations" like FAANGs at a huge scale, and nowhere else. You need techs at every layer of management, sufficient scale to justify the effort and not be swamped in overhead.

PS: For comparison, I see a similar effect with ex-FAANG engineers recommending metrics for everything. That's great. I have apps that get 1 real transaction... per month. The other 99.999% of hits in the metric are GoogleBot and random drive-by hackers.